TCP SYN Flood DoS Attack Experiments in Wireless Network

Download Report

Transcript TCP SYN Flood DoS Attack Experiments in Wireless Network

TCP SYN Flood DoS Attack Experiments
in Wireless Network
Prepared by
Ashif Adnan, Omair Alam, Akhtaruzzaman
School of Computer Science
University of Windsor
ON, Canada
1
Outline


Introduction
TCP/IP












General
Establishing TCP/IP connection
Weakness of the protocol
Possible attacks
SYN flood attacks
Bench work
 Wireless environment
 Essential software tools
 Generation of TCP SYN packet
 Capturing of TCP SYN packet
 Testing the attack
Our observations
Defensive techniques
Difficulties
Conclusion
Acknowledgment
References
2
Introduction

Sequence Number Guessing attack


First discovered in 1995. It creates a hole for the root
access from the remote machine and makes a trusted
system ignore any remote requests.
TCP SYN Flooding attack

First discovered in 1996. It is a Denial of Service
method. This attacks causes a host to retain enough
state for bogus half-open connections consuming all the
resources for establishing new legitimate connection.
3
TCP/IP (General)



TCP is connection oriented and reliable
It provides full duplex stream of data
It is the main protocol of services on the internet




SMTP, port 25
Telnet, port 23
FTP, port 21
HTTP, port 80
Concerns
come here
4
TCP/IP (General…cont’d)
Figure 1: TCP Header Format [5]
5
TCP/IP (Establishing a connection)
1. A -----------------SYN------------------> B
2. A <---------------SYN/ACK-------------- B
3. A ------------------ACK------------------> B
6
TCP/IP (Weakness of the protocol)

Three way handshaking process leads to the SYN
flood DoS attack.



What if the host A sends fake packet to host B?
The host B’s reply will never go to the target.
RFC 1122 has some good advices




Address Validation
Reject OPEN call to invalid IP address x
Reject SYN from invalid IP address x
Silently discard SYN to bcast/mcast addr x
7
TCP/IP (Severity of attacks)
SYN flood does not damage any
information or physical devices.
 However, it has very unpleasant effect



SYN flood can deny access to the port 80
where the http server resides in a vulnerable
machine.
E.g. Mail service for Panix, an ISP in New York,
was shut down by a SYN flood starting on 6
September 1996.
8
SYN flood attack (Technical description)
SYN stands for Synchronized flag in TCP
headers.
 The client sends a packet with SYN flag
set to open a connection targeting a port.



No application at that port -> the server
returns a packet with RST flag set.
An application exists at that port -> the server
acknowledges the first packet + sends its own
sequence number.


Client enters ESTABLISHED state.
Server puts the information about first packet in
connection queue.
9
SYN flood attack (Technical description… cont’d)
Figure 2: Handshaking sequence [10]
10
SYN flood attack (Technical description… cont’d)

The TCP stack functions as a state
machine.

netstat shows the states
C:\> netstat -a
Active Connections
Proto
Local Address
TCP
uofw-3l9unio6k3:http
TCP
uofw-3l9unio6k3:epmap
TCP
uofw-319unio6k3:2869
TCP
uofw-319unio6k3:2003
UDP
uofw-3l9unio6k3:1033
UDP
uofw-3l9unio6k3:1101
UDP
uofw-3l9unio6k3:1520
C:\>
Foreign Address
uofw-3l9unio6k3:0
uofw-3l9unio6k3:0
192.168.0.1:2078
192.168.0.4:2005
*:*
*:*
*:*
State
LISTENING
ESTABLISHED
CLOSE_WAIT
SYN_RCVD
11
SYN flood attack (Technical description… cont’d)

Half-open connection: When the SYN
packet has been received from the client,
but the client has not acknowledged the
server's SYN-ACK packet.

Limited number of ‘half-open’ connections
are accepted by the servers.

Attacking system can send few packets
per minute to the target port.
12
SYN flood attack (Technical description… cont’d)

The attacker can also choose a source
address to spoof.
Figure 3: Spoofing IP address [10]
13
Bench work (Wireless environment)
Systems configuration
Host A






Host B
OS Name: Microsoft Windows XP
Professional
Version: 2002
System type: X86-based PC
Processor: Mobile AMD Sempron
Processor speed: 1.79 GHz
Physical memory: 1 GB






OS name: Microsoft Windows 2000 server
Version: 5.0.2195 Service Pack 4 Build 2195
System type: X86-based PC
Processor: Intel Pentium 3
Processor speed: 1.3 GHz
Physical memory: 523,184 KB
Host C






OS name: Microsoft Windows XP
Version: 2001 Service Pack 2
System type: X86-based PC
Processor: Intel Celeron
Processor speed: 2.4 GHz
Physical memory: 256 MB
14
Bench work (Wireless environment.. cont’d)
Wireless network setup
Router: D-Link wireless G router (WBR-2310)
IP: 192.168.0.1
Subnet mask: 255.255.255.0
NIC card (Host C): Realtek RTL8185 54M Wireless PCI card
NIC card (Host A): Dell wireless 1390 WLAN Mini-Card
Host C: 192.168.0.104
Host A: 192.168.0.103
NIC card (Host B): Netgear 802.11g wireless PCMCIA card
Host B: 192.168.0.105
Ref: http://office.microsoft.com/en-us/clipart/default.aspx
15
Bench work (Essential softwares )
we need two main tools
1.
Host A: Generating TCP SYN packets installed on the host
A (attacking machine)
2.
Host B: Capturing those packets installed on the host B
(target machine).

The server installed on the host B in which we will be
flooding a specific port with TCP SYN packets. Following is
the details description of those software's
16
Bench work (Essential softwares…cont’d)
Packet builder tool
Figure 4: Engage Packet builder v2.2.0
17
Bench work (Essential softwares…cont’d)
System Requirements for Engage Packet builder

An Ethernet or Wireless Ethernet network card

Pentium III of higher

Windows 2000/XP/2003/Vista

WinPcap 3.1 or 4.0

128 MB RAM

6 MB of free disk space.
18
Bench work (Essential softwares…cont’d)
Packet capturing tool
Figure 5: Wireshark v0.99.6a
19
Bench work (Essential softwares…cont’d)
System Requirements for Wireshark:





Windows 2000, XP Home, XP Pro, XP Tablet PC, XP
Media Center, Server 2003 or Vista
32-bit Pentium or alike (recommended: 400MHz or
greater), 64-bit processors in WoW64 emulation
128MB RAM system memory
75MB available disk space
A supported network card for capturing:
▪ Ethernet: any card supported by Windows should do
▪ WLAN: Intel pro 100/VE is one of many wireless network
cards
20
Bench work (Essential softwares…cont’d)
Security scanner tool
Figure 6: Nmap v4.20
21
Bench work (Essential softwares…cont’d)
Network statistics tool
Figure 7: Netstat
22
Bench work (Essential softwares…cont’d)
Server software
Installed Apache Tomcat on the host machine B (target machine).

Apache Tomcat v5.5

Runtime Environment (JRE) version 5.0 or later
23
Bench work (Generating and sending TCP SYN packet)
Generating SYN packets
Figure 8: Engage Packet builder tool with all the specifications of TCP SYN packet
24
Bench work (Generating and sending TCP SYN packet…cont’d)
Alternative script file to generate SYN packet
%name=SYN Flood v0.2
%category=Test
IPDESTINATION=192.168.0.105
PORTDESTINATION=8080
SYN=1
!ECHO OFF
!Display=Script for SYN Flood
!SEND 50000 TCP
25
Bench work (Generating and sending TCP SYN packet…cont’d)
Accessing the script file
Figure 9: Engage Packet builder with the script file loaded
26
Bench work (Generating and sending TCP SYN packet…cont’d)
Alternative tool to generate SYN packets
Figure 10: CommView packet generating tool
27
Bench work (Capturing of TCP SYN packet)

Step 1: Root Access

Step 2: Setup System B’s Configuration


CaptureSupport
CapturePrivileges
C:\>sc config npf start= auto

Step 3: Choosing the right Interface

Step 4: Switching on the promiscuous mode
28
Bench work (Capturing of TCP SYN packet…cont’d)
Figure 11: The “Capture Interfaces” dialog box
29
Bench work (Capturing of TCP SYN packet…cont’d)
Figure 12: Selecting Promiscuous mode
30
Bench work (Capturing of TCP SYN packet…cont’d)
31
Figure 13: Wireshark with a TCP packet selected for viewing with SYN flag set
Bench work (Testing the attack)

Testing on Apache Tomcat server with port 8080

Starting the Apache Tomcat server
Figure 14: command to startup the Tomcat server on host B
32
Bench work (Testing the attack…cont’d)
Figure 15: Tomcat running up at port 8080 on host B
33
Bench work (Testing the attack…cont’d)
34
Bench work (Testing the attack…cont’d)

Scanning the port 8080 of host B from host A using nmap

Command for scanning the port
C:\nmap>nmap –sS 192.168.0.100 –p T:8080
Figure 15: Host B is up at port 8080
35
Bench work (Testing the attack…cont’d)

Checking the status of port 8080 using netstat
C:\>netstat –o
Figure 16: SYN_RECIEVED status of port 8080
36
Bench work (Testing the attack…cont’d)

Checking the port status again after the attack on port
8080 using nmap
C:\nmap>nmap –sS 192.168.0.100 –p T:8080
Figure 17: Host B is down at port 8080
37
Bench work (Testing the attack…cont’d)

Accessing the port 8080 using internet Explorer from attacking
machine A
Figure 18: IE with no connection to 8080
38
Our Observations


Other effects of TCP SYN flooding on target machine B
Before SYN flooding, CPU usage view using another tool CommView
Figure 19: Less CPU usage by the target host B
39
Our Observations…cont’d

To do this we have used another tool CommView to generate the packets.
Figure 20: Generating TCP SYN packets at the rate 1600 packets per second
40
Our Observations…cont’d

After SYN flooding, CPU usage view using the tool CommView
Figure 21: High CPU sage by the target during DoS attack
41
Defensive technique




Increasing the length of the queues
Reducing a time out value
SYN cookies
Built-in protection mechanisms (Win2000)

Windows 2000 parameters




SynAttackProtect <- 2
(HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters)
TcpMaxHalfOpen <- 100
TcpMaxHalfOpenRetried <- 80
Increasing the backlog queue




EnableDynamicBacklog <- 1
MinimumDynamicBacklog <- 20
MaximumDynamicBacklog <- 20000
DynamicBacklogGrowthDelta <- 10
42
Defensive technique…cont’d

Apache Tomcat server v5.x

Server parameters for port 8080
 acceptCount <- 100
 connectionTimeout <- 20000
43
Experimental difficulties

Choosing the right Operating System




Similar hardware configuration






Highly protected against SYN flooding attack
Incompatibility of WInPcap and Engage Packet builder with
Vista
Difficulties with Windows OS configuration
Attacking machine should have higher speed than the target
machine.
Lack of sufficient tools for windows platform
Insufficient documentation for free tools
Lack of sufficient hardwares
Engage Packet builder crashed the system several times
Spent lot of times finding the correct tools
44
Conclusions



Vulnerabilities of TCP protocol
Experimenting the attack
Usage of different tools







Engage Packet builder
CommView
Wireshark
Nmap
Netstat
Attacking and recognizing procedure
Deffensive techniques
45
Acknowledgement

We would like to thank our professor for his great support and
giving us the opportunity to learn network security in internet.

We would like to thank our audience for listening our
presentation.
46
References
[1] url:http://www.cert.org/
[2] url:ftp://info.cert.org/pub/cert_advisories/CA96.26.ping
[3] url:ftp://info.cert.org/pub/cert_advisories/CA96.21.tcp_syn_flooding
[4] http://www.niksula.hut.fi/~dforsber/synflood/result.html
[5] http://www.scit.wlv.ac.uk/rfc/rfc7xx/RFC7932.gif
[6] http://www.nic.funet.fi/pub/doc/rfc/rfc793.txt
[7] Wireshark User’s Guide
[8] http://www.winpcap.org
[9] http://wiki.wireshark.org/CaptureSetup
[10]http://www.networkcomputing.com/unixworld/security/004/004.txt.html
[11]http://en.wikipedia.org/wiki/Nmap
[12] http://www.securityfocus.com/infocus/1729
47
The End
Questions ?
48